diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2019-03-26 01:40:38 +0000 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2019-04-01 00:31:02 -0400 |
commit | 0cdc17ebd2072b6cdd3ec3695ea7ede745664a8b (patch) | |
tree | 7feee598cba29b9c9adf1a3d7c4e9548860a24f3 /fs/ubifs | |
parent | 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca (diff) | |
download | linux-0cdc17ebd2072b6cdd3ec3695ea7ede745664a8b.tar.bz2 |
ubifs: fix use-after-free on symlink traversal
free the symlink body after the same RCU delay we have for freeing the
struct inode itself, so that traversal during RCU pathwalk wouldn't step
into freed memory.
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'fs/ubifs')
-rw-r--r-- | fs/ubifs/super.c | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/fs/ubifs/super.c b/fs/ubifs/super.c index 8dc2818fdd84..12628184772c 100644 --- a/fs/ubifs/super.c +++ b/fs/ubifs/super.c @@ -276,14 +276,12 @@ static void ubifs_i_callback(struct rcu_head *head) { struct inode *inode = container_of(head, struct inode, i_rcu); struct ubifs_inode *ui = ubifs_inode(inode); + kfree(ui->data); kmem_cache_free(ubifs_inode_slab, ui); } static void ubifs_destroy_inode(struct inode *inode) { - struct ubifs_inode *ui = ubifs_inode(inode); - - kfree(ui->data); call_rcu(&inode->i_rcu, ubifs_i_callback); } |